Thu.Aug 02, 2018

article thumbnail

The Complexities of Vulnerability Management & What Needs To Be Done

Data Breach Today

86 Percent of Bugs Patchable Within 24 Hours, Says Flexera's Alejandro Lavie One measure of why it's so difficult for organizations to keep their software patched and better secured: Of the nearly 20,000 unique vulnerabilities in 2,000 products cataloged last year, only half involved Microsoft, Adobe, Java, Chrome or Firefox software, says Flexera's Alejandro Lavie.

Security 157
article thumbnail

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

The targeting of Sen. Claire McCaskill by Russian intelligency agency hackers, as she runs for re-election, underscores the need for each individual and organization to take online privacy and security as a core part of our everyday lives. Related: Using ‘gamification’ for security training. The National Cyber Security Alliance is a non-profit group, underwritten by the top tech companies and biggest banks, that has been out there since 2001 promoting best practices and supplying pr

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Announce Arrests of 3 'FIN7' Cybercrime Gang Members

Data Breach Today

Gang Tied to 15 Million Stolen Payment Cards, $1 Billion in Losses Three Ukrainian men who were allegedly part of a hacking gang that stole more than 15 million payment card records from U.S. businesses, sold the data in underground markets, and enabled at least $12.4 million in fraud, have been arrested in Germany, Poland and Spain at U.S. request.

Marketing 140
article thumbnail

[Podcast] Supporting Women in Information Management

AIIM

Consider the following stats about women in the workplace: When women are in senior executive positions, companies achieve 70% stronger stock price growth. Companies with the highest gender diversity see a 10% greater return on equity and 48% higher operating result. Having at least 1 woman on a board decreases bankruptcy by 20%. Gender diversity is so important in business, especially in fields such as IT that tend to be historically male-dominant.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Reddit Says Attackers Bypassed SMS-Based Authentication

Data Breach Today

Yes, Reddit Was Breached; No, Don't Dump Multifactor Authentication Reddit suffered a data breach in June after attackers managed to bypass its SMS-based two-factor authentication system. User data from 2007 and before was compromised. Security experts say the breach should serve as a reminder that using any two-factor authentication is better than none.

More Trending

article thumbnail

Why the Use of Microsegmentation in Data Centers Is Growing

Data Breach Today

The need to secure cloud applications and address the security gaps in flat data center architectures is leading more organizations to adopt microsegmentation technology, says VMWare's Bruce Davie.

Cloud 100
article thumbnail

Queensland police computer hacking: no action taken in nearly 90% of cases

The Guardian Data Protection

Of officers charged, one accessed ex-girlfriends’ data and one gave woman’s details to abusive partner Queensland police took no disciplinary action against 52 of the 59 officers investigated internally for computer hacking during a 13-month period, amid concern police do not have adequate measures in place to prevent the wrongful access of private personal data.

article thumbnail

Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

Thales Cloud Protection & Licensing

This article was originally featured as a guest post on Venafi’s blog. Thales eSecurity and Venafi are technology partners. One of the biggest threat to machine identities today is the integrity of the software that runs within them, and that dictates their programed function. Whereas many machines worked independently in the past, the availability of ubiquitous communications is making it possible for networks of machines – including sensors, cloud applications, and distributed controls &

article thumbnail

Sign up for the new education sector email updates

IT Governance

To support the wider education sector with data protection and cyber security, we are launching a sector specific email newsletter and blog series. The newsletter will highlight our latest blogs as well as guidance and information about relevant new products and services, featured experts and a ‘your questions answered’ section. How to sign up.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Supreme Court of Ireland to Review Facebook Privacy Case

Hunton Privacy

On July 31, 2018, the Supreme Court of Ireland granted Facebook, Inc.’s (“Facebook”) leave to appeal a lower court’s ruling sending a privacy case to the Court of Justice of the European Union (the “CJEU”). Austrian privacy activist Max Schrems challenged Facebook’s data transfer practices, arguing that Facebook’s use of standard contractual clauses failed to adequately protect EU citizens’ data.

Privacy 56
article thumbnail

The GDPR affects the use of email too

IT Governance

Data breaches caused by the misuse of email are becoming common, with a lack of appropriate staff training consistently to blame. The ICO (Information Commissioner’s Office) recently issued a fine of £200,000 to the Independent Inquiry into Child Sexual Abuse for incorrectly sending a bulk email to 90 recipients rather than Bcc’ing (blind carbon copy) them in.

GDPR 61
article thumbnail

Using In-Game Purchases to Launder Money

Schneier on Security

Evidence that stolen credit cards are being used to purchase items in games like Clash of Clans, which are then resold for cash.

65
article thumbnail

The Periscope Podcast – Episode 1 Incident Response Management

IT Governance

Step into the Breach – Episode 1. Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into cyber incident response management and IT Governance products and solutions for organisations which suffer a data breach. We’re joined this week by Tony Drewitt, Managing Director at IT Governance. Tony was kind enough to share his experience about the operational and media planning tasks required to ensure swift and effective handling of a data breach.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Alleged Iran-linked APT group RASPITE targets US electric utilities

Security Affairs

According to Dragos firm, the RASPITE cyber-espionage group (aka Leafminer) has been targeting organizations in the United States, Europe, Middle East, and East Asia. Researchers from security firm Dragos reported that a group operating out of Iran tracked as RASPITE has been targeting entities in the United States, Europe, Middle East, and East Asia, industrial cybersecurity firm Dragos warns.

Access 55
article thumbnail

Mishcon de Reya complains about anti-tax evasion measures

The Guardian Data Protection

Law firm says new measures infringe privacy and data protection rights The law firm Mishcon de Reya has filed a legal complaint against new anti-tax evasion measures, arguing that they infringe privacy and data protection rights. The Information Commissioner’s Office confirmed it had received a complaint against HMRC and the Common Reporting Standard, a system whereby different countries’ tax authorities automatically exchange information.

Privacy 47
article thumbnail

Analyzing the Telegram-based Android remote access trojan HeroRAT

Security Affairs

Researchers at CSE Cybsec ZLab analyzed shared published their analysis of the Telegram-based Android RAT tracked as HeroRAT. In June, researchers from security firm ESET discovered a new family of Android Remote Administration Tool (RAT), dubbed HeroRAT , that leverages the Telegram BOT API to communicate with the attacker. The use of Telegram API can be considered a new trend in Android RAT landscape, because other RAT families implementing the same functionalities, such as TeleRAT and IRRAT,

Access 52
article thumbnail

Understanding the role and benefits of edge computing

Information Management Resources

Data that requires real-time processing for improved productivity and operating efficiencies needs to reside closer to the 'edge' of the network, where the work is taking place.

51
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Three members of FIN7 (Carbanak) gang charged with stealing 15 million credit cards

Security Affairs

Three members of the cybercrime group tracked as FIN7 and Carbanak have been indicted and charged with 26 felony counts. Three members of the notorious cybercrime gang known as FIN7 and Carbanak have been indicted and charged with 26 felony counts of conspiracy, wire fraud, computer hacking, access device fraud and aggravated identity theft. The gang stole over a billion euros from banks across the world, the name “Carbanak” comes with the name of the malware they used to compromise computers

Sales 50
article thumbnail

Weekly Update 98

Troy Hunt

It's the coffee-machine weekly update! A slight change of scenery but other than that, it's business as usual. I'm going to keep this intro super-brief because it's very near beer o'clock and I have a very important task to go and take care of: BBQ time ?? pic.twitter.com/yq5hXOGABt — Troy Hunt (@troyhunt) August 3, 2018. References. Fashion Nexus suffered a data breach ("Is there an official statement?

article thumbnail

Power Grid Security: How Safe Are We?

Dark Reading

Experiencing a power outage? It could have been caused by a hacker. or just a squirrel chewing through some equipment. And that's a problem.

article thumbnail

Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

IG Guru

Hackers used phishing emails to break into a Virginia bank in two separate cyber intrusions over an eight-month period, making off with more than $2.4 million total. Now the financial institution is suing its insurance provider for refusing to fully cover the losses. According to a lawsuit filed last month in the Western District of […]. The post Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M appeared first on IG Guru.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How GDPR Could Turn Privileged Insiders into Bribery Targets

Dark Reading

Regulatory penalties that exceed the cost of an extortion payout may lead to a new form of ransomware. These four steps can keep you from falling into that trap.

GDPR 45
article thumbnail

As Election Threats Mount, Voting Machine Hacks are a Distraction

The Security Ledger

Beating up on direct record electronic (DRE) voting machines has been popular sport in security circles for more than a decade. But is it a distraction from other, more present and dangerous threats to the integrity of elections? A growing body of evidence says “yes.” In a little more than a week, some of the world’s best hackers. Read the whole entry. » Related Stories Episode 106: Election Trolls Are Afoot.

article thumbnail

DocuWare Continues Leadership in Cloud Growth

Info Source

New Windsor NY, August 2, 2018 – DocuWare , provider of cloud solutions for document management and workflow automation, demonstrates its continued leadership in mid-market cloud solutions, with cloud revenues up 112% in the first half of 2018. This bodes well for the company, and its growing partner channel, as industry predictions show that 78% of small to medium-sized businesses will move to some form of cloud computing in the next two years.

Cloud 40
article thumbnail

IBM and Hortonworks Ease Customers’ Path to Hadoop and AI in the Cloud

IBM Big Data Hub

IBM and Hortonworks recently announced IBM Hosted Analytics with Hortonworks (IHAH),marking further progress in the pair’s year-long strategic relationship.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Epson Unveils Two Document Scanners Designed to Easily Organize Receipts and Invoices

Info Source

LONG BEACH, Calif. – July 31, 2018 – Epson America, a leading provider of digital imaging solutions, today introduced the WorkForce ® ES-300WR and WorkForce ES-500WR document scanners bundled with Epson’s ScanSmart Accounting Edition Software 1 and Nuance ® Power PDF software. Designed for small business and home users, the ES-300WR and ES-500WR scanners streamline the processes of organizing and sharing financial documents.

article thumbnail

Industrial Sector Targeted in Highly Personalized Spear-Phishing Campaign

Dark Reading

At least 400 companies in Russia have been in the bullseye of new, sophisticated spear-phishing attacks, Kaspersky Lab says.

article thumbnail

JIEC Partners with Kofax to Deliver RPA and Digital Transformation Solutions

Info Source

Irvine, CA, July 31, 2018 – Kofax ® , a leading supplier of software to automate and digitally transform information intensive processes, today announced it has entered into a sales partnership agreement with JIEC Co., Ltd. , to offer Kofax’s robotic process automation (RPA) and digital transformation solutions to JIEC customers. This collaboration will accelerate the automation of business operation for users of SAP.